Sankardas Roy
  According to our database1,
  Sankardas Roy
  authored at least 36 papers
  between 2005 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Benchmarking Android Malware Detection: Rethinking the Role of Traditional and Deep Learning Models.
    
  
    CoRR, February, 2025
    
  
  2024
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection.
    
  
    CoRR, 2024
    
  
Deleted File Recovery for the Linux File System (Ext4): Finding the State-of-the-Art.
    
  
    Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
    
  
  2022
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps.
    
  
    Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022
    
  
  2021
Leveraging attention-based deep neural networks for security vetting of Android applications.
    
  
    EAI Endorsed Trans. Security Safety, 2021
    
  
  2020
    Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
    
  
  2019
    EAI Endorsed Trans. Security Safety, 2019
    
  
    Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
    
  
    Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
    
  
  2018
    Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018
    
  
    Proceedings of the From Database to Cyber Security, 2018
    
  
  2017
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
    
  
Quantification of microbial species in solid state fermentation samples using signature genomic sequences.
    
  
    Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
    
  
  2015
    Comput. Commun., 2015
    
  
    Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
    
  
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning.
    
  
    Proceedings of the 31st Annual Computer Security Applications Conference, 2015
    
  
  2014
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
    
  
    IEEE Trans. Inf. Forensics Secur., 2014
    
  
    Secur. Commun. Networks, 2014
    
  
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
    
  
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
    
  
  2013
    IEEE Trans. Commun., 2013
    
  
    Proceedings of the 2013 IEEE Global Communications Conference, 2013
    
  
  2012
    IEEE Trans. Veh. Technol., 2012
    
  
    IEEE Trans. Inf. Forensics Secur., 2012
    
  
    Proceedings of IEEE International Conference on Communications, 2012
    
  
  2011
    Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
    
  
  2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
    
  
    IEEE Trans. Mob. Comput., 2010
    
  
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
    
  
    Proceedings of the 2010 Spring Simulation Multiconference, 2010
    
  
    Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
    
  
    Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
    
  
  2009
    Secur. Commun. Networks, 2009
    
  
  2008
    Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
    
  
  2007
    Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
    
  
  2006
    Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
    
  
  2005
    Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005